Cyber Security

1234567
Across
  1. 2. network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam.
  2. 3. the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
  3. 4. software that is specifically designed to disrupt, damage, or gain unauthorized access to a computer system.
  4. 5. file, program, or piece of code that appears to be legitimate and safe, but is actually malware they are packaged and delivered inside legitimate software (hence their name), and they're often designed to spy on victims or steal data.
  5. 7. is an authorized simulated attack performed on a computer system to evaluate its security. Penetration testers use the same tools, techniques, and processes as attackers to find and demonstrate the business impacts of weaknesses in a system
Down
  1. 1. is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices to gain unauthorized access to systems, networks or physical locations or for financial gain.
  2. 6. involves multiple connected online devices, collectively known as a botnet, which are used to overwhelm a target website with fake traffic.